Hackers exploit the WP-Automatic plugin bug to create administrator accounts on WordPress sites

April 26, 2024PressroomThreat Intelligence/Cyber ​​Attacks Threat actors are actively attempting to exploit a critical security flaw in the WP‑Automatic plugin for WordPress that could allow site takeovers. The defect, traced…

The biggest threat to the 2024 election: chain attacks on sinks

If history has anything to tell us, the most significant cyber threat to this year’s election won’t be a leak, a distributed denial of service (DDoS) attack, or a fake…

PCI launches payment card cybersecurity effort in the Middle East

The Payment Card Industry (PCI) Security Standards Council plans to expand its role to the Middle East, as the volume of card-based payments continues to grow in the region and,…

5 reasons why Python is popular among cybersecurity professionals

Secure coding Python’s versatility and short learning curve are just two factors that explain the language’s “hold” on cybersecurity April 25, 2024 • , 3 minutes Read The Python programming…

5 attack trends organizations of all sizes should monitor

Cyber ​​security is constantly evolving and, as such, requires regular vigilance. Microsoft analyzes more than 78 trillion security signals every day to better understand the latest attack vectors and techniques.…

FTC issues $5.6 million in Ring privacy refunds to customers

The Federal Trade Commission (FTC) will refund more than $5.6 million to Ring customers after a 2023 privacy settlement. Last year the FTC filed a complaint against Ring, the Amazon-owned…

Chinese keyboard apps allow 1 billion people to eavesdrop

Almost all keyboard apps that allow users to input Chinese characters into their Android, iOS, or other mobile devices are vulnerable to attacks that allow an adversary to capture the…

Cisco Zero-Days Anchor’s “ArcaneDoor” cyber espionage campaign

A state-sponsored criminal group exploited two Cisco zero-day vulnerabilities in firewall devices to target the perimeter of government networks with two custom backdoors in a global cyber espionage campaign. Dubbed…

Godfather banking trojan generates 1.2K samples in 57 countries

Approximately 1,000 samples of the Godfather mobile banking Trojan are circulating in dozens of countries around the world, targeting hundreds of banking apps. First discovered in 2022, Godfather, which can…

North Korea’s Lazarus Group deploys new Kaolin RAT via dummy decoys

April 25, 2024PressroomMalware/cyber threat The North Korea-linked criminal actor known as Lazarus Group has used its time-tested artificial lures to deliver a new remote access trojan called KAOLIN RAT. The…